Digital Forensics Quiz 3

0.0(0)
studied byStudied by 2 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/108

flashcard set

Earn XP

Description and Tags

Chapters 8 (Windows Forensics) & 13 (Network Forensics)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

109 Terms

1
New cards

_______ is the Windows program that handles security and logon policies.

Lsass.exe

2
New cards

__________ is a storage controller device driver in Windows.

Ntbootdd.sys

3
New cards

__________ is a Windows file that is an interface for hardware.

Hal.dll

4
New cards

A __________is a software program that appears to be a physical computer and executes programs as if it were a physical computer.

virtual machine

5
New cards

A hacker installed an application on a computer to recover deleted files, and then uninstalled the application to hide her tracks. Where would a forensic examiner most likely find evidence that the application was once installed?

HKLM\SOFTWARE

6
New cards

A suspect has erased their browsing history on their computer. The computer has Microsoft Internet Explorer installed. The forensic investigator must retrieve recently visited web addresses and recently opened files. What should the investigator do?

Download a tool that allows for retrieval and review of the index.dat file.

7
New cards

As applications are processing commands and data on a machine, they are in a constant state of change. This creates a problem when attempting to perform live system forensics in which data is not acquired at a unified moment. The collected data may have problems with which of the following?

Data consistency

8
New cards

Carl is beginning a digital forensic investigation. He has been sent into the field to collect a machine. When he arrives, he sees that the computer is running Windows and has open applications. He decides to preserve as much data as possible by capturing data in memory. What should Carl perform?

Volatile memory analysis

9
New cards

Marty is investigating the computer of a cyberstalking suspect. He wanted to check the suspect's browsing history in Microsoft Internet Explorer, but it had already been erased. Where else can he look on the computer for browsing history information?

The index.dat file

10
New cards

On a Windows-based machine, which file is considered the core of the operating system?

ntoskrnl.exe

11
New cards

Someone has attempted to gain unauthorized access to data files on Robert's machine. He would like to investigate if any forensic evidence has been left behind. Of the following, where should Robert start his search?

Event Viewer Security log

12
New cards

Steven is a forensic examiner. He is interested in examining the pictures across all user profiles to look for evidence of malicious activity. Where should he begin his search for these files?

C:\Users

13
New cards

The _________ file is responsible for managing services on a Windows computer.

Smss.exe

14
New cards

The Windows __________ log contains successful and unsuccessful logon events.

Security

15
New cards

The Windows Registry is organized into five sections referred to as __________, each of which contains specific information.

hives

16
New cards

The Windows Registry is organized into five sections. The __________ section contains those settings common to the entire machine, regardless of the individual user.

HKEY_LOCAL_MACHINE (HKLM)

17
New cards

The Windows Registry is organized into five sections. The __________ section is critical to forensic investigations. It has profiles for all the users, including their settings.

HKEY_USERS (HKU)

18
New cards

What is the best definition of "dump" in terms of computer memory?

A complete copy of every bit of memory or cache recorded in permanent storage or printed on paper

19
New cards

What is the definition of "stack (S)"?

Memory that is allocated based on the last-in, first-out (LIFO) principle

20
New cards

What is the repository of all information on a Windows system?

The Windows Registry

21
New cards

What is the Windows swap file used to augment?

Random access memory (RAM)

22
New cards

You boot up a machine to start a forensic investigation. You get a message on screen indicating that the "Master Boot Record Cannot Be Found." What step of the boot process has failed?

The computer has failed to read the master boot record (MBR).

23
New cards

True or False? During the boot process of a Windows computer, the NTLDR must begin loading file system drivers before the master boot record (MBR) can pass control to the boot sector on the boot partition.

False

24
New cards

True or False? In Windows 10, the Recycle Bin is located in a hidden directory.

True

25
New cards

True or False? In Windows, file permissions never change when moving a file.

False

26
New cards

True or False? In Windows, the System Resource Usage Monitor (SRUM) database collects data on executables.

True

27
New cards

True or False? In Windows, the term "64-bit processing" refers to how the central processing unit and the operating system process information.

True

28
New cards

True or False? In Windows, when copying or cutting a file to a different partition, the file will retain the rights of the source folder.

False

29
New cards

True or False? Many versions of Microsoft Word store a string in the Windows Registry that is the MAC address of the machine on which the document was created.

True

30
New cards

True or False? On a Windows system, some viruses infect the boot sector and are loaded when the system loads.

True

31
New cards

True or False? Regarding the Windows boot process, the term "power-on self-test (POST)" refers to a brief hardware test that the basic input/output system (BIOS) performs upon boot-up.

True

32
New cards

True or False? Some malware on Windows computers can modify the Windows Registry.

True

33
New cards

True or False? The netstat utility enables a forensic examiner to check live system data.

True

34
New cards

True or False? The passphrase needed to connect to a Wi-Fi network on a Windows computer is stored in the Windows Registry.

True

35
New cards

True or False? The Windows Security log contains events logged by Windows system components.

False

36
New cards

True or False? The Windows ShellBag tracks compatibility issues with executed programs.

False

37
New cards

True or False? The Windows swap file is also referred to as virtual memory.

True

38
New cards

True or False? Volume Shadow Copy (VSS) is a Windows service related to backups.

True

39
New cards

True or False? When a Windows computer connects to a wireless network, the service set identifier (SSID) is logged as a preferred network connection and can be found in the Windows Registry.

True

40
New cards

True or False? When dumping memory on a Windows computer, the forensic examiner may have to work with two types of memory: heap (H) and stack (S).

True

41
New cards

True or False? When performing volatile data analysis, you must compute the hash before and after completing the memory capture.

False

42
New cards

True or False? Windows Registry keys contain an associated value called LastWriteTime, which is similar to the datestamp on a file or folder.

False

43
New cards

A port is a number that identifies a channel in which communication can occur. Which port does HTTPS (Hypertext Transfer Protocol Secure) use for secure web browser display?

Port 443

44
New cards

A port is a number that identifies a channel in which communication can occur. Which port does SSH (Secure Shell) use to remotely and securely log on to a system?

Port 22

45
New cards

A port is a number that identifies a channel in which communication can occur. Which port is used by the Internet Message Access Protocol (IMAP) email service?

Port 220

46
New cards

All of the following are true of Internet Protocol (IP) addresses, except:

subnetting is the process of redistributing a network into larger portions.

47
New cards

Because a ________ operates based on the Media Access Control (MAC) address in a packet and that is not routable, it cannot send data to _________ or across a WAN.

switch, the internet

48
New cards

Data that is sent across a network is divided into chunks called:

packets.

49
New cards

Hajar is a forensic examiner. She suspects that hackers have infiltrated a network through a Cisco router, so she wants to perform forensics on the router. She uses the HyperTerminal tool to connect to the router safely, which is live and running. Which command should she enter to display the routing table?

show ip route

50
New cards

In which denial of service (DoS) attack does the attacker send fragments of packets with bad values in them, causing the target system to crash when it tries to reassemble the fragments?

Teardrop attack

51
New cards

Jack is a forensic specialist. He wants to examine a network router for potential evidence in a case. What is the first step he should take to safely examine the router?

Connect to the router over the network.

52
New cards

On a network, a __________ prevents traffic jams by ensuring that data goes straight from its origin to its proper destination. It remembers the address of every node on the network and anticipates where data needs to go.

switch

53
New cards

Packets are divided into three sections:

header, payload, and footer.

54
New cards

Sniffers are used to collect digital evidence. Which software package allows the user to map out what ports are open on a target system and what services are running?

Nmap

55
New cards

The 802.11 (Wi-Fi) and Ethernet protocols run at which layer of the Open Systems Interconnection (OSI) model?

Physical (Layer 1)

56
New cards

The Transmission Control Protocol (TCP) header has synchronization bits that are used to establish and terminate communications across a network between two communicating parties. The __________ bit indicates that there is no more data from the sender.

FIN

57
New cards

The Transmission Control Protocol (TCP) header has synchronization bits that are used to establish and terminate communications across a network between two communicating parties. The __________ bit synchronizes sequence numbers.

SYN

58
New cards

Which denial of service (DoS) attack generates a large number of ICMP echo requests from a single request, acting like an amplifier and causing a traffic jam in the target network?

Smurf attack

59
New cards

Which denial of service (DoS) attack sends a tremendous number of ICMP packets to the target, hoping to overwhelm it?

Ping flood

60
New cards

Which layer of the Open Systems Interconnection (OSI) model provides end-to-end communication control?

Transport (Layer 4)

61
New cards

Which wireless standard is referred to as "White-Fi" and "Super Wi-Fi"?

IEEE 802.11af

62
New cards

Which wireless standard obtains a bandwidth of up to 600 mbps with the use of four spatial streams at a channel width of 40 MHz? It also uses multiple-input multiple-output (MIMO), which resolves more information than is possible using a single antenna.

802.11n-2009

63
New cards

True or False? 192.168.0.0 to 192.168.255.255 is a private Internet Protocol (IP) address range.

True

64
New cards

True or False? A device's log files contain the primary records of a person's activities on a system or network.

True

65
New cards

True or False? A normal network conversation starts with one side sending a packet with the SYN bit turned on.

True

66
New cards

True or False? A packet being transferred across a network can have several headers added by different protocols at different layers of the Open Systems Interconnection (OSI) model.

True

67
New cards

True or False? A packet mistreating attack is a type of denial of service (DoS) attack.

True

68
New cards

True or False? A sniffer is computer software or hardware that can intercept and log traffic passing over a digital network.

True

69
New cards

True or False? Domain Name Service (DNS) uses port 53 to translate URLs into web addresses.

True

70
New cards

True or False? In a classic port scan, a hacker sends an Internet Control Message Protocol (ICMP) packet to each port in order to see if it responds.

True

71
New cards

True or False? In a decoy scan strategy, an attacker spoofs scans that originate from a large number of decoy machines and adds his or her Internet Protocol (IP) address somewhere in the mix.

True

72
New cards

True or False? In a ping flood attack, the attacker sends fragments of packets with bad values in them, which causes the target system to crash when it tries to reassemble the fragments.

False

73
New cards

True or False? In a router table poisoning attack, the attacker alters the routing data update packets that the routing protocols need, resulting in incorrect entries in the routing table.

True

74
New cards

True or False? In a Smurf attack, the attacker sends a fake TCP SYN packet with the same source and destination Internet Protocol (IP) addresses and ports as the target computer.

False

75
New cards

True or False? Intrusion detection systems record events that match known attack signatures, such as buffer overflows or malicious code execution.

True

76
New cards

True or False? Once a computer boots and connects to a network, Ethernet assigns a private Internet Protocol (IP) address to the computer.

False

77
New cards

True or False? Routers maintain a routing table to keep track of routes, or which connections are to be used for different networks.

True

78
New cards

True or False? Stateful packet inspection is the most basic type of firewall.

False

79
New cards

True or False? The Internet Protocol (IP) address of 127.0.0.1 designates the machine you are on, regardless of that machine's assigned IP address.

True

80
New cards

True or False? The Internet Protocol (IP) header contains the source port, destination port, a sequence number, and several other fields.

False

81
New cards

True or False? The TCP (OSI Layer 4) and IP (OSI Layer 3) portions of a unit of information transfer across a network only contain a header and payload. However, if the Layer 2 portion of a unit of information transfer is analyzed, in addition to a header and payload, there is a part at the end called the octet.

False

82
New cards

True or False? Wireshark is a type of router forensic tool.

False

83
New cards

Boot Process

  1. BIOS (firmware: a small program stored on a chip on the motherboard that runs

    before your operating system)

    1. POST (power-on-self-test) → Checks if hardware (RAM, CPU, keyboard, disks, etc.) is working properly

    2. Read MBR (master boot record) → Loading and executing the first sector of the disk (boot code and partition information necessary to start the OS)

  2. Boot Loader (responsible for starting the OS)

    1. Loads NTLDR/ BOOTMGR → NT Loader

    2. Switches to 32- or 64-bit → CPU mode switch done by NTLDR, Starts with 16-bit real mode

  3. Boot Files

    1. Min. drivers → minimal drivers loaded to access disk, file system, and input devices during boot

    2. boot.ini → Boot Configuration File (which OS to load and from where)

    3. NTOSKRNL → kernel that handles process management, memory, security, and hardware abstraction

    4. hal.dll → Hardware Abstraction Layer (interface between the Windows kernel and the physical hardware)

    5. Windows Registry → central configuration database for Windows

  4. Kernel Loading

  5. Win32 Subsystem starts

84
New cards

NtDetect.com

detects basic hardware devices before the OS loads, e.g., keyboard, mouse, system clock, hard drives etc.

85
New cards

Explorer.exe

windows shell (provides the desktop, taskbar, and file explorer interface after successful logon)

86
New cards

Crss.exe

console management, thread & process creation and termination etc.

87
New cards

File System (MFT)

  • The MFT is the heart of NTFS — a special file that acts as an index for every

    file and folder on the volume, including system files 

  • Each entry (~1 KB) describes one file or directory

  • Key forensic contents: File name and path, timestamps, content location,

    deleted file records (marked inactive but recoverable)

  • Why it matters: Investigators can recover deleted filenames,

    creation/modification times, and even partial content remnants — critical for

    establishing a timeline of activity or detecting file tampering

88
New cards

File System ($LogFile)

  • A transactional log that records file system changes before they are committed to disk

  • Tracks metadata updates like file creation, rename, move, and delete events

  • Helps reconstruct recent file system activity, even if a file has been deleted or overwritten

  • Can reveal timestamps more recent than the MFT (since it logs pending transactions)

89
New cards

File System ($Bitmap)

  • A bitmap file used by NTFS to track used and unused clusters on the volume.

  • Indicates which disk clusters are currently allocated.

  • By correlating with MFT records, investigators can locate unallocated/deleted data clusters.

  • Useful for carving deleted files that no longer have MFT entries but still occupy disk sectors.

90
New cards

File System ($Recycle.Bin)

  • Directory used by Windows to store deleted files before permanent removal

  • Reveals who deleted what and when

  • $I files store: Original filename and path, Date/time of deletion, File size

  • Even if files are emptied from the Recycle Bin, $I metadata may persist and can be recovered.

91
New cards

Registry

  • The Windows Registry is a hierarchical database that stores system and user configuration information.

  • It controls how Windows boots, which programs run, what hardware is installed, and user-specific settings.

  • Every action a user takes—installing software, connecting a device, opening files—often leaves traces here

92
New cards

Registry (Structure)

  • Hives → Keys → Subkeys → Values

  • Hive is the top-level database file in the registry (analogy: like a drive (C:, D:))

  • Keys are like directories or folders inside each hive (Each key can contain:

  • other keys (called subkeys)), one or more values

  • Subkeys are keys within keys — like subfolders/ subdirectories

  • Values are the data items stored under a key or subkey — like files inside folders.

  • EX: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ru

    n → Hive\Key\Subkey\Value

93
New cards

SAM (Security Account Manager)

  • Location: C:\Windows\System32\config\SAM

  • Purpose: Stores user account information and password hashes

  • Forensic Value:

    • Lists local user accounts, groups, and last logon timestamps

    • Investigators can extract password hashes

    • Crucial for logon analyses and detecting unauthorized users

  • Example Evidence: User John last logged in at 2025-9-23 08:42:16 UTC

94
New cards

SYSTEM

  • Location: C:\Windows\System32\config\SYSTEM

  • Purpose: Stores system-wide configuration and hardware information

  • Forensic Value:

    • Identify connected USB devices

    • Determine Windows startup entries, time zone, and network setup

    • Reconstruct system startup and shutdown times

  • Example Evidence: A SanDisk USB drive (Serial: 001CC0A0) was last connected on 2025-9-18 at 21:15:33.

95
New cards

SOFTWARE

  • Location: C:\Windows\System32\config\SOFTWARE

  • Purpose: Contains settings for installed applications and system components

  • Forensic Value:

    • Lists installed programs, version info, and install/uninstall times

    • Tracks recently opened files, last run programs, and autostart entries

    • Helps attribute software use to a user, proving intent or activity

  • Example Evidence: Malware ‘CryptoLocker.exe’ was registered under the Run key to launch automatically at startup

96
New cards

NTUSER.DAT

  • Location: C:\Users\<username>\NTUSER.DAT

  • Purpose: User-specific registry hive loaded when the user logs on

  • Forensic Value:

    • Contains user activity traces, including:

      • Recent file open history (RecentDocs)

      • Typed URLs (TypedURLs)

      • Search queries (WordWheelQuery)

      • Run commands (RunMRU)

    • Excellent for timeline reconstruction and user profiling

  • Example Evidence: User John opened resume.docx and searched for ‘VPN logs’ on 2025-9-21

97
New cards

USB info

  • Records details about connected USB devices

  • Forensic Use: Identifies specific USB drives, their serial numbers, and when they were last plugged in

98
New cards

Wireless Networks

  • Stores SSIDs (Service Set Identifier), connection dates, and security settings for Wi-Fi networks

  • Forensic Use: Tracks which networks a system connected to and when

  • Example: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles

99
New cards

Tracking Documents

  • Tracks recently opened or saved documents from File Explorer and dialog boxes

  • Forensic Use: Shows what files the user accessed or modified recently

  • Example: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs

100
New cards

Malware

  • Malicious software often modifies registry keys or creates autorun entries

  • Forensic Use: Detects malware in specific location

  • Example: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run